• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: ARM ]" (12)
  1. 1. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack
    Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
    10.7472/jksii.2024.25.1.157
    Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense
  2. 2. Practical suggestions for development of『manned & unmanned complex combat performance plan』(drone operation)
    Cheol-jung Kim, Bo-Ram Kim, Min-Youn Kim, Jae-Seok Lim, Vol. 25, No. 1, pp. 137-146, Feb. 2024
    10.7472/jksii.2024.25.1.137
    Keywords: Army TIGER, Drone, FPV, Frequency, Perspective
  3. 3. A Research on Adversarial Example-based Passive Air Defense Method against Object Detectable AI Drone
    Simun Yuk, Hweerang Park, Taisuk Suh, Youngho Cho, Vol. 24, No. 6, pp. 119-125, Dec. 2023
    10.7472/jksii.2023.24.6.119
    Keywords: object detectable drone, AI drone, Adversarial machine learning, swarm drone, air defense, base defense
  4. 4. Development of Modular Control System Based on Closed-Loop Control for Wind Farms
    Hyunho Ji, Taehyoung Kim, Jeongtaek Lim, Kyung Sun Ham, Vol. 22, No. 6, pp. 17-24, Dec. 2021
    10.7472/jksii.2021.22.6.17
    Keywords: modular control system, Wind farm, Active power control, closed loop control
  5. 5. Analysis of Building Characteristics and Temporal Changes of Fire Alarms
  6. 6. A Task Offloading Approach using Classification and Particle Swarm Optimization
    John Cristopher A. Mateo, Jaewan Lee, Vol. 18, No. 1, pp. 1-10, Feb. 2017
    10.7472/jksii.2017.18.1.01
    Keywords: Cloudlet, Classification, Particle Swarm Optimization, Mobile Cloud Computing
  7. 7. Ant Colony Hierarchical Cluster Analysis
    Mun-Su Kang, Young-Sik Choi, Vol. 15, No. 5, pp. 95-106, Oct. 2014
    10.7472/jksii.2014.15.5.95
    Keywords: Ant-based clustering, ant-based hierarchical clustering, clustering, swarm intelligence
  8. 8. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  9. 9. Saturated Performance Analysis of IEEE 802.11 DCF with Imperfect Channel Sensing
    Soo-Young Shin, Seog Chae, Vol. 13, No. 1, pp. 7-14, Feb. 2012
    10.7472/jksii.2012.13.1.7
    Keywords: IEEE 802.11, imperfect channel sensing, missed-detection, False Alarm, Performance
  10. 10. Digital Convergence Teaching Strategy System using Spearman Correlation Coefficients
    Byung-Wook Lee, Vol. 11, No. 6, pp. 111-122, Dec. 2010
    Keywords: Digital convergence, teaching strategy, Spearman correlation coefficients